YubiKey Example (#4026)

* Yubikey Example

* PR Feedback
This commit is contained in:
Ben Arent 2020-07-14 08:03:31 -07:00 committed by GitHub
parent 60242e13bb
commit 21597ecf4a
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 6 additions and 5 deletions

View file

@ -481,7 +481,8 @@ connector. There are three possible values (types) of 2FA:
or [Authy](https://www.authy.com/) or any other TOTP client.
+ `u2f` implements [U2F](https://en.wikipedia.org/wiki/Universal_2nd_Factor)
standard for utilizing hardware (USB) keys for second factor.
standard for utilizing hardware (USB) keys for second factor. You can use [YubiKeys](https://www.yubico.com/),
[SoloKeys](https://solokeys.com/) or any other hardware token which implements the FIDO U2F standard.
+ `off` turns off second factor authentication.
@ -537,7 +538,7 @@ auth_service:
type: oidc
```
### FIDO U2F
### Hardware Keys - YubiKey FIDO U2F
Teleport supports [FIDO U2F](https://www.yubico.com/about/background/fido/)
hardware keys as a second authentication factor. By default U2F is disabled. To

View file

@ -72,10 +72,10 @@ connector and it is enforced by default.
There are two types of 2FA supported:
* [TOTP](https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm)
* [U2F](https://en.wikipedia.org/wiki/Universal_2nd_Factor)
* [TOTP - e.g. Google Authenticator](https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm)
* [U2F - e.g. YubiKey](https://en.wikipedia.org/wiki/Universal_2nd_Factor)
TOTP is the default. You can use [Google
`TOTP` is the default. You can use [Google
Authenticator](https://en.wikipedia.org/wiki/Google_Authenticator) or
[Authy](https://www.authy.com/) or any other TOTP client.